config.Y 17.4 KB
Newer Older
1 2 3
/*
 *	BIRD -- Core Configuration
 *
4
 *	(c) 1998--2000 Martin Mares <mj@ucw.cz>
5
 *      (c) 2004       Ondrej Filip <feela@network.cz>
6 7 8 9 10 11
 *
 *	Can be freely distributed and used under the terms of the GNU GPL.
 */

CF_HDR

12
#include "nest/rt-dev.h"
13
#include "nest/password.h"
14
#include "nest/cmds.h"
15
#include "lib/lists.h"
16

17 18 19 20
CF_DEFINES

static struct proto_config *this_proto;
static struct iface_patt *this_ipatt;
21
static struct iface_patt_node *this_ipn;
Jan Moskyto Matejka's avatar
Jan Moskyto Matejka committed
22
/* static struct roa_table_config *this_roa_table; */
23 24
static list *this_p_list;
static struct password_item *this_p_item;
25 26
static int password_id;

27 28 29 30 31 32
static void
iface_patt_check(void)
{
  struct iface_patt_node *pn;

  WALK_LIST(pn, this_ipatt->ipn_list)
33
    if (!pn->pattern || pn->prefix.type)
34 35 36 37
      cf_error("Interface name/mask expected, not IP prefix");
}


38 39 40
static inline void
reset_passwords(void)
{
41
  this_p_list = NULL;
42 43 44
}

static inline list *
45 46 47 48 49 50 51
get_passwords(void)
{
  list *rv = this_p_list;
  this_p_list = NULL;
  return rv;
}

52
#define DIRECT_CFG ((struct rt_dev_config *) this_proto)
53

54 55
CF_DECLS

56
CF_KEYWORDS(ROUTER, ID, PROTOCOL, TEMPLATE, PREFERENCE, DISABLED, DEBUG, ALL, OFF, DIRECT)
57
CF_KEYWORDS(INTERFACE, IMPORT, EXPORT, FILTER, NONE, TABLE, STATES, ROUTES, FILTERS)
58
CF_KEYWORDS(IPV4, IPV6, VPN4, VPN6, ROA4, ROA6)
59
CF_KEYWORDS(RECEIVE, LIMIT, ACTION, WARN, BLOCK, RESTART, DISABLE, KEEP, FILTERED)
60
CF_KEYWORDS(PASSWORD, FROM, PASSIVE, TO, ID, EVENTS, PACKETS, PROTOCOLS, INTERFACES)
Jan Moskyto Matejka's avatar
Jan Moskyto Matejka committed
61
CF_KEYWORDS(PRIMARY, STATS, COUNT, FOR, COMMANDS, PREEXPORT, NOEXPORT, GENERATE) /* ,ROA */
62
CF_KEYWORDS(LISTEN, BGP, V6ONLY, DUAL, ADDRESS, PORT, PASSWORDS, DESCRIPTION, SORTED)
63
CF_KEYWORDS(RELOAD, IN, OUT, MRTDUMP, MESSAGES, RESTRICT, MEMORY, IGP_METRIC, CLASS, DSCP)
64
CF_KEYWORDS(GRACEFUL, RESTART, WAIT, MAX, FLUSH, AS)
65

66
CF_ENUM(T_ENUM_RTS, RTS_, DUMMY, STATIC, INHERIT, DEVICE, STATIC_DEVICE, REDIRECT,
Ondřej Filip's avatar
Ondřej Filip committed
67
	RIP, OSPF, OSPF_IA, OSPF_EXT1, OSPF_EXT2, BGP, PIPE)
68
CF_ENUM(T_ENUM_SCOPE, SCOPE_, HOST, LINK, SITE, ORGANIZATION, UNIVERSE, UNDEFINED)
69
CF_ENUM(T_ENUM_RTC, RTC_, UNICAST, BROADCAST, MULTICAST, ANYCAST)
70
CF_ENUM(T_ENUM_RTD, RTD_, ROUTER, DEVICE, BLACKHOLE, UNREACHABLE, PROHIBIT, MULTIPATH)
71
CF_ENUM(T_ENUM_ROA, ROA_, UNKNOWN, VALID, INVALID)
72

73
%type <i32> idval
74
%type <f> imexport
75
%type <r> rtable
76
%type <s> optsym
77
%type <ra> r_args
78
%type <sd> sym_args
79
%type <i> proto_start echo_mask echo_size debug_mask debug_list debug_flag mrtdump_mask mrtdump_list mrtdump_flag export_mode limit_action table_type table_sorted tos
80
%type <ps> proto_patt proto_patt2
81
%type <g> limit_spec
82 83 84

CF_GRAMMAR

85 86
/* Setting of router ID */

87
CF_ADDTO(conf, rtrid)
88

89
rtrid:
90 91
   ROUTER ID idval ';' { new_config->router_id = $3; }
 | ROUTER ID FROM iface_patt ';' { new_config->router_id_from = this_ipatt; }
92 93 94
 ;

idval:
95
   NUM { $$ = $1; }
96
 | '(' term ')' { $$ = f_eval_int($2); }
97
 | IP4 { $$ = ip4_to_u32($1); }
98 99 100
 | SYM {
     if ($1->class == (SYM_CONSTANT | T_INT) || $1->class == (SYM_CONSTANT | T_QUAD))
       $$ = SYM_VAL($1).i;
101 102
     else if (($1->class == (SYM_CONSTANT | T_IP)) && ipa_is_ip4(SYM_VAL($1).ip))
       $$ = ipa_to_u32(SYM_VAL($1).ip);
103 104 105
     else
       cf_error("Number of IPv4 address constant expected");
   }
106 107
 ;

108

109
CF_ADDTO(conf, listen)
110

111
listen: LISTEN BGP listen_opts ';' ;
112

113
listen_opts:
114
   /* Nothing */
115
 | listen_opts listen_opt
116 117
 ;

118 119 120
listen_opt: 
   ADDRESS ipa { new_config->listen_bgp_addr = $2; }
 | PORT expr { new_config->listen_bgp_port = $2; }
121 122
 | V6ONLY { new_config->listen_bgp_flags = 0; }
 | DUAL { new_config->listen_bgp_flags = 1; }
123 124 125
 ;


126 127 128 129 130
CF_ADDTO(conf, gr_opts)

gr_opts: GRACEFUL RESTART WAIT expr ';' { new_config->gr_wait = $4; } ;


131 132
/* Creation of routing tables */

133 134 135 136 137
CF_ADDTO(conf, table)

table_type:
   /* empty */ { $$ = NET_IP4; }
 | IPV4 { $$ = NET_IP4; }
138
 | IPV6 { $$ = NET_IP6; }
139 140
 | VPN4 { $$ = NET_VPN4; }
 | VPN6 { $$ = NET_VPN6; }
141 142
 | ROA4 { $$ = NET_ROA4; }
 | ROA6 { $$ = NET_ROA6; }
143 144 145
 ;

table_sorted:
146 147 148 149
          { $$ = 0; }
 | SORTED { $$ = 1; }
 ;

150
table: table_type TABLE SYM table_sorted {
151
   struct rtable_config *cf;
152 153
   cf = rt_new_table($3, $1);
   cf->sorted = $4;
154 155 156
   }
 ;

157 158 159 160
/* Definition of protocols */

CF_ADDTO(conf, proto)

161 162 163
proto_start:
   PROTOCOL { $$ = SYM_PROTO; }
 | TEMPLATE { $$ = SYM_TEMPLATE; }
164
 ;
165 166 167

proto_name:
   /* EMPTY */ {
168
     struct symbol *s = cf_default_name(this_proto->protocol->template, &this_proto->protocol->name_counter);
169
     s->class = this_proto->class;
170 171 172 173
     s->def = this_proto;
     this_proto->name = s->name;
     }
 | SYM {
174
     cf_define_symbol($1, this_proto->class, this_proto);
175 176
     this_proto->name = $1->name;
   }
177 178
 | FROM SYM {
     struct symbol *s = cf_default_name(this_proto->protocol->template, &this_proto->protocol->name_counter);
179 180
     s->class = this_proto->class;
     s->def = this_proto;
181
     this_proto->name = s->name;
182

183 184 185
     if (($2->class != SYM_TEMPLATE) && ($2->class != SYM_PROTO)) cf_error("Template or protocol name expected");
     proto_copy_config(this_proto, $2->def);
   }
186 187 188 189
 | SYM FROM SYM {
     cf_define_symbol($1, this_proto->class, this_proto);
     this_proto->name = $1->name;

190
     if (($3->class != SYM_TEMPLATE) && ($3->class != SYM_PROTO)) cf_error("Template or protocol name expected");
191 192
     proto_copy_config(this_proto, $3->def);
   }
193 194 195 196
 ;

proto_item:
   /* EMPTY */
197
 | PREFERENCE expr {
198
     if ($2 < 0 || $2 > 0xFFFF) cf_error("Invalid preference");
199 200
     this_proto->preference = $2;
   }
201
 | DISABLED bool { this_proto->disabled = $2; }
202
 | DEBUG debug_mask { this_proto->debug = $2; }
203
 | MRTDUMP mrtdump_mask { this_proto->mrtdump = $2; }
204 205
 | IMPORT imexport { this_proto->in_filter = $2; }
 | EXPORT imexport { this_proto->out_filter = $2; }
206
 | RECEIVE LIMIT limit_spec { this_proto->rx_limit = $3; }
207
 | IMPORT LIMIT limit_spec { this_proto->in_limit = $3; }
208
 | EXPORT LIMIT limit_spec { this_proto->out_limit = $3; }
209
 | IMPORT KEEP FILTERED bool { this_proto->in_keep_filtered = $4; }
210
 | TABLE rtable { this_proto->table = $2; }
211
 | ROUTER ID idval { this_proto->router_id = $3; }
212
 | DESCRIPTION text { this_proto->dsc = $2; }
213 214 215 216
 ;

imexport:
   FILTER filter { $$ = $2; }
217
 | where_filter
218 219
 | ALL { $$ = FILTER_ACCEPT; }
 | NONE { $$ = FILTER_REJECT; }
220 221
 ;

222
limit_action:
223
   /* default */ { $$ = PLA_DISABLE; }
224 225 226 227
 | ACTION WARN { $$ = PLA_WARN; }
 | ACTION BLOCK { $$ = PLA_BLOCK; }
 | ACTION RESTART { $$ = PLA_RESTART; }
 | ACTION DISABLE { $$ = PLA_DISABLE; }
228 229 230
 ;

limit_spec:
231
   expr limit_action {
232 233
     struct proto_limit *l = cfg_allocz(sizeof(struct proto_limit));
     l->limit = $1;
234
     l->action = $2;
235 236
     $$ = l;
   }
237
 | OFF { $$ = NULL; }
238 239
 ;

240 241 242 243 244 245 246
rtable:
   SYM {
     if ($1->class != SYM_TABLE) cf_error("Table name expected");
     $$ = $1->def;
   }
 ;

247 248 249 250
CF_ADDTO(conf, debug_default)

debug_default:
   DEBUG PROTOCOLS debug_mask { new_config->proto_default_debug = $3; }
251
 | DEBUG COMMANDS expr { new_config->cli_debug = $3; }
252 253
 ;

254 255
/* MRTDUMP PROTOCOLS is in systep/unix/config.Y */

256 257
/* Interface patterns */

258 259 260 261 262 263 264 265 266
iface_patt_node_init:
   /* EMPTY */ {
     struct iface_patt_node *ipn = cfg_allocz(sizeof(struct iface_patt_node));
     add_tail(&this_ipatt->ipn_list, NODE ipn);
     this_ipn = ipn;
   }
 ;

iface_patt_node_body:
267 268
   TEXT { this_ipn->pattern = $1; /* this_ipn->prefix stays zero */ }
 | opttext net_or_ipa { this_ipn->pattern = $1; this_ipn->prefix = $2; }
269 270 271 272 273 274 275 276
 ;

iface_negate:
       { this_ipn->positive = 1; }
 | '-' { this_ipn->positive = 0; }
 ;

iface_patt_node:
277
   iface_patt_node_init iface_negate iface_patt_node_body
278 279 280 281 282 283
 ;


iface_patt_list:
   iface_patt_node
 | iface_patt_list ',' iface_patt_node
284 285
 ;

286 287 288
/* For name/mask-only iface patterns */
iface_patt_list_nopx: iface_patt_list { iface_patt_check(); }

289 290 291 292 293 294 295 296 297 298 299
iface_patt_init: {
   /* Generic this_ipatt init */
   this_ipatt = cfg_allocz(sizeof(struct iface_patt));
   init_list(&this_ipatt->ipn_list);
 }
 ;

iface_patt:
   iface_patt_init iface_patt_list
 ;

300 301 302 303
tos:
   CLASS expr { $$ = $2 & 0xfc;        if (($2 < 0) || ($2 > 255)) cf_error("TX class must be in range 0-255"); }
 | DSCP expr  { $$ = ($2 & 0x3f) << 2; if (($2 < 0) || ($2 > 63))  cf_error("TX DSCP must be in range 0-63"); }
 ;
304

305
/* Direct device route protocol */
306 307 308

CF_ADDTO(proto, dev_proto '}')

309
dev_proto_start: proto_start DIRECT {
310
     this_proto = proto_config_new(&proto_device, $1);
311
     init_list(&DIRECT_CFG->iface_list);
312 313 314 315
   }
 ;

dev_proto:
316
   dev_proto_start proto_name '{'
317
 | dev_proto proto_item ';'
318
 | dev_proto dev_iface_patt ';'
319 320
 ;

321
dev_iface_init:
322
   /* EMPTY */ {
323
     this_ipatt = cfg_allocz(sizeof(struct iface_patt));
324
     add_tail(&DIRECT_CFG->iface_list, NODE this_ipatt);
325
     init_list(&this_ipatt->ipn_list);
326 327 328
   }
 ;

329 330
dev_iface_patt:
   INTERFACE dev_iface_init iface_patt_list
331 332
 ;

333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349
/* Debug flags */

debug_mask:
   ALL { $$ = ~0; }
 | OFF { $$ = 0; }
 | '{' debug_list '}' { $$ = $2; }
 ;

debug_list:
   debug_flag
 | debug_list ',' debug_flag { $$ = $1 | $3; }
 ;

debug_flag:
   STATES	{ $$ = D_STATES; }
 | ROUTES	{ $$ = D_ROUTES; }
 | FILTERS	{ $$ = D_FILTERS; }
350
 | INTERFACES	{ $$ = D_IFACES; }
351 352 353 354
 | EVENTS	{ $$ = D_EVENTS; }
 | PACKETS	{ $$ = D_PACKETS; }
 ;

355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372
/* MRTDump flags */

mrtdump_mask:
   ALL { $$ = ~0; }
 | OFF { $$ = 0; }
 | '{' mrtdump_list '}' { $$ = $2; }
 ;

mrtdump_list:
   mrtdump_flag
 | mrtdump_list ',' mrtdump_flag { $$ = $1 | $3; }
 ;

mrtdump_flag:
   STATES	{ $$ = MD_STATES; }
 | MESSAGES	{ $$ = MD_MESSAGES; }
 ;

373 374
/* Password lists */

375 376 377 378 379
password_list:
   PASSWORDS '{' password_items '}'
 | password_item
;

380 381 382 383 384 385 386 387 388 389 390
password_items: 
    /* empty */
  | password_item ';' password_items
;

password_item:
    password_item_begin '{' password_item_params '}'
  | password_item_begin
;

password_item_begin:
391
   PASSWORD text {
392 393 394 395 396
     if (!this_p_list) {
     	this_p_list = cfg_alloc(sizeof(list));
     	init_list(this_p_list);
        password_id = 1;
     }
397 398 399 400 401 402
     this_p_item = cfg_alloc(sizeof (struct password_item));
     this_p_item->password = $2;
     this_p_item->genfrom = 0;
     this_p_item->gento = TIME_INFINITY;
     this_p_item->accfrom = 0;
     this_p_item->accto = TIME_INFINITY;
403
     this_p_item->id = password_id++;
404
     add_tail(this_p_list, &this_p_item->n);
405
   }
406
;
407

408
password_item_params:
409
   /* empty */ { } 
410 411
 | GENERATE FROM datetime ';' password_item_params { this_p_item->genfrom = $3; }
 | GENERATE TO datetime ';' password_item_params { this_p_item->gento = $3; }
412
 | GENERATE FROM datetime TO datetime ';' password_item_params { this_p_item->genfrom = $3; this_p_item->gento = $5; }
413 414
 | ACCEPT FROM datetime ';' password_item_params { this_p_item->accfrom = $3; }
 | ACCEPT TO datetime ';' password_item_params { this_p_item->accto = $3; }
415
 | ACCEPT FROM datetime TO datetime ';' password_item_params { this_p_item->accfrom = $3; this_p_item->accto = $5; }
416
 | ID expr ';' password_item_params { this_p_item->id = $2; if ($2 <= 0) cf_error("Password ID has to be greated than zero."); }
417 418 419
 ;


420

421
/* Core commands */
422
CF_CLI_HELP(SHOW, ..., [[Show status information]])
423

424
CF_CLI(SHOW STATUS,,, [[Show router status]])
425
{ cmd_show_status(); } ;
426

427 428 429
CF_CLI(SHOW MEMORY,,, [[Show memory usage]])
{ cmd_show_memory(); } ;

430
CF_CLI(SHOW PROTOCOLS, proto_patt2, [<protocol> | \"<pattern>\"], [[Show routing protocols]])
431
{ proto_apply_cmd($3, proto_cmd_show, 0, 0); } ;
432

433
CF_CLI(SHOW PROTOCOLS ALL, proto_patt2, [<protocol> | \"<pattern>\"], [[Show routing protocol details]])
434
{ proto_apply_cmd($4, proto_cmd_show, 0, 1); } ;
435

436 437 438 439 440
optsym:
   SYM
 | /* empty */ { $$ = NULL; }
 ;

441 442 443 444 445 446
CF_CLI(SHOW INTERFACES,,, [[Show network interfaces]])
{ if_show(); } ;

CF_CLI(SHOW INTERFACES SUMMARY,,, [[Show summary of network interfaces]])
{ if_show_summary(); } ;

447
CF_CLI_HELP(SHOW ROUTE, ..., [[Show routing table]])
448
CF_CLI(SHOW ROUTE, r_args, [[[<prefix>|for <prefix>|for <ip>] [table <t>] [filter <f>|where <cond>] [all] [primary] [filtered] [(export|preexport|noexport) <p>] [protocol <p>] [stats|count]]], [[Show routing table]])
449 450 451 452 453 454 455
{ rt_show($3); } ;

r_args:
   /* empty */ {
     $$ = cfg_allocz(sizeof(struct rt_show_data));
     $$->filter = FILTER_ACCEPT;
   }
456
 | r_args net_any {
457
     $$ = $1;
458 459
     if ($$->addr) cf_error("Only one prefix expected");
     $$->addr = $2;
460
   }
461
 | r_args FOR net_or_ipa {
462
     $$ = $1;
463
     if ($$->addr) cf_error("Only one prefix expected");
464
     $$->show_for = 1;
465 466
     $$->addr = cfg_alloc($3.length);
     net_copy($$->addr, &($3));
467
   }
468 469 470 471 472 473 474
 | r_args TABLE SYM {
     $$ = $1;
     if ($3->class != SYM_TABLE) cf_error("%s is not a table", $3->name);
     $$->table = ((struct rtable_config *)$3->def)->table;
   }
 | r_args FILTER filter {
     $$ = $1;
475
     if ($$->filter != FILTER_ACCEPT) cf_error("Filter specified twice");
476 477
     $$->filter = $3;
   }
478 479 480 481 482
 | r_args where_filter {
     $$ = $1;
     if ($$->filter != FILTER_ACCEPT) cf_error("Filter specified twice");
     $$->filter = $2;
   }
483 484 485 486
 | r_args ALL {
     $$ = $1;
     $$->verbose = 1;
   }
487 488 489 490
 | r_args PRIMARY {
     $$ = $1;
     $$->primary_only = 1;
   }
491
 | r_args FILTERED {
492
     $$ = $1;
493
     $$->filtered = 1;
494
   }
495
 | r_args export_mode SYM {
496 497
     struct proto_config *c = (struct proto_config *) $3->def;
     $$ = $1;
498
     if ($$->export_mode) cf_error("Protocol specified twice");
499
     if ($3->class != SYM_PROTO || !c->proto) cf_error("%s is not a protocol", $3->name);
500 501
     $$->export_mode = $2;
     $$->export_protocol = c->proto;
502 503
     $$->running_on_config = c->proto->cf->global;
   }
504 505 506 507 508 509 510
 | r_args PROTOCOL SYM {
     struct proto_config *c = (struct proto_config *) $3->def;
     $$ = $1;
     if ($$->show_protocol) cf_error("Protocol specified twice");
     if ($3->class != SYM_PROTO || !c->proto) cf_error("%s is not a protocol", $3->name);
     $$->show_protocol = c->proto;
     $$->running_on_config = c->proto->cf->global;
511
   }
512 513 514 515
 | r_args STATS {
     $$ = $1;
     $$->stats = 1;
   }
516 517 518 519
 | r_args COUNT {
     $$ = $1;
     $$->stats = 2;
   }
520 521
 ;

522 523 524 525
export_mode:
   PREEXPORT	{ $$ = RSEM_PREEXPORT; }
 | EXPORT	{ $$ = RSEM_EXPORT; }
 | NOEXPORT	{ $$ = RSEM_NOEXPORT; }
526 527
 ;

528

529
CF_CLI_HELP(SHOW SYMBOLS, ..., [[Show all known symbolic names]])
530
CF_CLI(SHOW SYMBOLS, sym_args, [table|filter|function|protocol|template|<symbol>], [[Show all known symbolic names]])
531 532
{ cmd_show_symbols($3); } ;

533 534 535 536 537 538 539 540 541 542 543 544
sym_args:
   /* empty */ {
     $$ = cfg_allocz(sizeof(struct sym_show_data));
   }
 | sym_args TABLE { $$ = $1; $$->type = SYM_TABLE; }
 | sym_args FUNCTION { $$ = $1; $$->type = SYM_FUNCTION; }
 | sym_args FILTER { $$ = $1; $$->type = SYM_FILTER; }
 | sym_args PROTOCOL { $$ = $1; $$->type = SYM_PROTO; }
 | sym_args TEMPLATE { $$ = $1; $$->type = SYM_TEMPLATE; }
 | sym_args SYM { $$ = $1; $$->sym = $2; }
 ;

545

546 547
CF_CLI_HELP(DUMP, ..., [[Dump debugging information]])
CF_CLI(DUMP RESOURCES,,, [[Dump all allocated resource]])
548
{ rdump(&root_pool); cli_msg(0, ""); } ;
549
CF_CLI(DUMP SOCKETS,,, [[Dump open sockets]])
550
{ sk_dump_all(); cli_msg(0, ""); } ;
551 552
CF_CLI(DUMP EVENTS,,, [[Dump event log]])
{ io_log_dump(); cli_msg(0, ""); } ;
553
CF_CLI(DUMP INTERFACES,,, [[Dump interface information]])
554
{ if_dump_all(); cli_msg(0, ""); } ;
555
CF_CLI(DUMP NEIGHBORS,,, [[Dump neighbor cache]])
556
{ neigh_dump_all(); cli_msg(0, ""); } ;
557
CF_CLI(DUMP ATTRIBUTES,,, [[Dump attribute cache]])
558
{ rta_dump_all(); cli_msg(0, ""); } ;
559
CF_CLI(DUMP ROUTES,,, [[Dump routing table]])
560
{ rt_dump_all(); cli_msg(0, ""); } ;
561
CF_CLI(DUMP PROTOCOLS,,, [[Dump protocol information]])
562 563
{ protos_dump_all(); cli_msg(0, ""); } ;

564 565 566 567 568
CF_CLI(EVAL, term, <expr>, [[Evaluate an expression]])
{ cmd_eval($2); } ;

CF_CLI_HELP(ECHO, ..., [[Control echoing of log messages]])
CF_CLI(ECHO, echo_mask echo_size, (all | off | { debug | trace | info | remote | warning | error | auth }) [<buffer-size>], [[Control echoing of log messages]]) {
569 570 571 572 573 574 575
  cli_set_log_echo(this_cli, $2, $3);
  cli_msg(0, "");
} ;

echo_mask:
   ALL { $$ = ~0; }
 | OFF { $$ = 0; }
576
 | '{' log_mask_list '}' { $$ = $2; }
577 578 579 580 581 582 583 584 585
 ;

echo_size:
   /* empty */ { $$ = 4096; }
 | NUM {
     if ($1 < 256 || $1 > 65536) cf_error("Invalid log buffer size");
     $$ = $1;
   }
 ;
586

587
CF_CLI(DISABLE, proto_patt, <protocol> | \"<pattern>\" | all, [[Disable protocol]])
588
{ proto_apply_cmd($2, proto_cmd_disable, 1, 0); } ;
589
CF_CLI(ENABLE, proto_patt, <protocol> | \"<pattern>\" | all, [[Enable protocol]])
590
{ proto_apply_cmd($2, proto_cmd_enable, 1, 0); } ;
591
CF_CLI(RESTART, proto_patt, <protocol> | \"<pattern>\" | all, [[Restart protocol]])
592
{ proto_apply_cmd($2, proto_cmd_restart, 1, 0); } ;
593
CF_CLI(RELOAD, proto_patt, <protocol> | \"<pattern>\" | all, [[Reload protocol]])
594
{ proto_apply_cmd($2, proto_cmd_reload, 1, CMD_RELOAD); } ;
595
CF_CLI(RELOAD IN, proto_patt, <protocol> | \"<pattern>\" | all, [[Reload protocol (just imported routes)]])
596
{ proto_apply_cmd($3, proto_cmd_reload, 1, CMD_RELOAD_IN); } ;
597
CF_CLI(RELOAD OUT, proto_patt, <protocol> | \"<pattern>\" | all, [[Reload protocol (just exported routes)]])
598
{ proto_apply_cmd($3, proto_cmd_reload, 1, CMD_RELOAD_OUT); } ;
599

600
CF_CLI_HELP(DEBUG, ..., [[Control protocol debugging via BIRD logs]])
601
CF_CLI(DEBUG, proto_patt debug_mask, (<protocol> | <pattern> | all) (all | off | { states | routes | filters | interfaces | events | packets }), [[Control protocol debugging via BIRD logs]])
602
{ proto_apply_cmd($2, proto_cmd_debug, 1, $3); } ;
603 604 605

CF_CLI_HELP(MRTDUMP, ..., [[Control protocol debugging via MRTdump files]])
CF_CLI(MRTDUMP, proto_patt mrtdump_mask, (<protocol> | <pattern> | all) (all | off | { states | messages }), [[Control protocol debugging via MRTdump format]])
606 607 608 609
{ proto_apply_cmd($2, proto_cmd_mrtdump, 1, $3); } ;

CF_CLI(RESTRICT,,,[[Restrict current CLI session to safe commands]])
{ this_cli->restricted = 1; cli_msg(16, "Access restricted"); } ;
610

611
proto_patt:
612 613 614
   SYM  { $$.ptr = $1; $$.patt = 0; }
 | ALL  { $$.ptr = NULL; $$.patt = 1; }
 | TEXT { $$.ptr = $1; $$.patt = 1; }
615 616
 ;

617 618 619 620 621 622
proto_patt2:
   SYM  { $$.ptr = $1; $$.patt = 0; }
 |      { $$.ptr = NULL; $$.patt = 1; }
 | TEXT { $$.ptr = $1; $$.patt = 1; }
 ;

623 624 625
CF_ADDTO(dynamic_attr, IGP_METRIC
	{ $$ = f_new_dynamic_attr(EAF_TYPE_INT, T_INT, EA_GEN_IGP_METRIC); })

626

627 628 629
CF_CODE

CF_END